Thanks. I had forgotten that encrypting data tends to "randomize" it and so it wouldn't compress very well. What I was thinking was of was GitHub's private repositories perhaps containing company proprietary software. It might be attractive to a startup which recruits non-local talent and does its work via the Internet rather than in an office building. In that case, my paranoia would kick in about the possibility of GitHub being "hacked" and my source stolen or compromised. I guess in this case, it would be wise for the startup to run a GitHub Enterprise virtual server on its own equipment. Or, like I do, have a "git" subdirectory on a machine which contains the various repositories and is accessible only via SSH. I.e. keep it "in house" with external developers having an SSH connection to the "git server".
Thanks for the feedback. On Tuesday, December 11, 2012 1:44:36 PM UTC-6, John McKown wrote: > > I haven't seen anything like this in anything I've read so far. And I know > that git is all about freely sharing. But is there some way to have git > keep the repository files encrypted. I know that the files in the .git > subdirectory are compressed. It seems to me that it should be relatively > simple to have the "git add" do an encrypt step just before the compress > step in its processing. You could have a git config core.encrypt and git > config cone.encrypt.key variable. The core.encrypt would be TRUE or FALSE. > If the value is TRUE, then you could set the core.encrypt.key variable or > you could have git ask for the password interactively. Or maybe I just > really want it to occur when I do a "git push". > > Yes, I'm a bit of a security nut. And, yes, I know I could gpg encrypt the > file before doing the git add. Or I guess that I could even make my own > git-encrypt-add script to do it via a "git encrypt-add" operation. Hum. > > Your thoughts are appreciated. > --